Results 271 to 280 of about 1,173,800 (295)
Some of the next articles are maybe not open access.
Robustness analysis of classical and fuzzy decision trees under adversarial evasion attack
Applied Soft Computing, 2021P. Chan +4 more
semanticscholar +1 more source
A Transfer Attack to Image Watermarks
International Conference on Learning RepresentationsWatermark has been widely deployed by industry to detect AI-generated images. The robustness of such watermark-based detector against evasion attacks in the white-box and black-box settings is well understood in the literature. However, the robustness in
Yuepeng Hu +3 more
semanticscholar +1 more source
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks
IEEE Transactions on Information Forensics and SecurityMachine learning (ML) has been widely adopted for Android malware detection to deal with serious threats brought by explosive malware attacks. However, it has been recently proven that ML-based detection systems exhibit inherent vulnerabilities to ...
Yuyang Zhou +4 more
semanticscholar +1 more source
EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification
IEEE Transactions on Dependable and Secure ComputingWith machine learning techniques widely used to automate Android malware detection, it is important to investigate the robustness of these methods against evasion attacks.
Zhan Shu, Guanhua Yan
semanticscholar +1 more source
Evasion Attacks Against Statistical Code Obfuscation Detectors
2017In the domain of information security, code obfuscation is a feature often employed for malicious purposes. For example there have been quite a few papers reporting that obfuscated JavaScript frequently comes with malicious functionality such as redirecting to external malicious websites. In order to capture such obfuscation, a class of detectors based
Jiawei Su +2 more
openaire +1 more source
Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File
Computers & securityWindows malware is predominantly available in cyberspace and is a prime target for deliberate adversarial evasion attacks. Although researchers have investigated the adversarial malware attack problem, a multitude of important questions remain unanswered,
Kshitiz Aryal +3 more
semanticscholar +1 more source
Evasion Attacks in Smart Power Grids: A Deep Reinforcement Learning Approach
Consumer Communications and Networking ConferenceIn smart power grids, certain customers are motivated by financial gains to manipulate electricity consumption data, aiming to reduce their bills. Despite the development of machine learning-based detectors, these systems remain vulnerable to evasion ...
Ahmed T. El-Toukhy +4 more
semanticscholar +1 more source
IEEE Transactions on Intelligent Vehicles
Autonomous vehicles (AVs) heavily depend on machine learning-based algorithms for the purpose of environmental perception. However, extensively utilized deep learning-based visual perception methods are susceptible to adversarial visual sensor attacks ...
Jingguo Liang +4 more
semanticscholar +1 more source
Autonomous vehicles (AVs) heavily depend on machine learning-based algorithms for the purpose of environmental perception. However, extensively utilized deep learning-based visual perception methods are susceptible to adversarial visual sensor attacks ...
Jingguo Liang +4 more
semanticscholar +1 more source
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack
Computers & security, 2023Jiaxuan Geng +5 more
semanticscholar +1 more source

